⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ca-openssl.cnf

📁 Perl写的CA认证程序
💻 CNF
字号:
## OpenSSL example configuration file.# This is mostly being used for generation of certificate requests.## This definition stops the following lines choking if HOME isn't# defined.HOME                    = .RANDFILE                = $ENV::HOME/.rnd# Extra OBJECT IDENTIFIER info:#oid_file               = $ENV::HOME/.oidoid_section             = new_oids# To use this configuration file with the "-extfile" option of the# "openssl x509" utility, name here the section containing the# X.509v3 extensions to use:# extensions            =# (Alternatively, use a configuration file that has only# X.509v3 extensions in its main [= default] section.)[ new_oids ]# We can add new OIDs in here for use by 'ca' and 'req'.# Add a simple OID like this:# testoid1=1.2.3.4# Or use config file substitution like this:# testoid2=${testoid1}.5.6####################################################################[ ca ]default_ca	= CA_default		# The default ca section####################################################################[ CA_default ]dir		= /usr/local/OpenCA		# Where everything is keptcerts		= $dir/certs/issued	# Where the issued certs are keptcrl_dir		= $dir/crl		# Where the issued crl are keptdatabase	= $dir/conf/openssl/index.txt	# database index file.new_certs_dir	= $dir/outbound/certs	# default place for new certs.certificate	= $dir/stuff/cacert.pem	# The CA certificateserial		= $dir/conf/openssl/serial	# The current serial numbercrl		= $dir/crl/current.pem	# The current CRLprivate_key	= $dir/private/cakey.pem# The private keyRANDFILE	= $dir/private/.rand	# private random number fileoid_file	= $dir/private/.oidx509_extensions	= user_cert		# The extentions to add to the certemail_in_dn	= no			# Don't add EMAIL field in DN#crl_extensions	= crl_ext		# Extensions to add to CRL                                        # As Netscape only accepts CLRs V1,					# DON't use CRL's extensions					# at least if you are uning Netscape					# 4.5(-).default_days	= 365			# how long to certify fordefault_crl_days= 31			# how long before next CRLdefault_md	= md5			# which md to use.preserve	= yes			# keep passed DN ordering# A few difference way of specifying how similar the request should look# For type CA, the listed attributes must be the same, and the optional# and supplied fields are just that :-)policy		= policy_match# For the CA policy[ policy_match ]countryName		= suppliedorganizationName	= suppliedorganizationalUnitName	= optionalcommonName		= optionalemailAddress		= optional# For the 'anything' policy# At this point in time, you must list all acceptable 'object'# types.[ policy_anything ]countryName		= supplied## stateOrProvinceName	= optional## localityName		= optionalorganizationName	= suppliedorganizationalUnitName	= optionalcommonName		= suppliedemailAddress		= optional####################################################################[ req ]default_bits		= 1024default_keyfile 	= privkey.pemdistinguished_name	= req_distinguished_nameattributes		= req_attributesx509_extensions		= v3_ca	                  # The extentions to						  # add to the self signed						  # cert[ req_distinguished_name ]emailAddress			= Email AddressemailAddress_max		= 60commonName			= Common Name (eg, YOUR name)commonName_max			= 64organizationalUnitName		= Organizational Unit Name (eg, section)#organizationalUnitName_default	= OpenCA User0.organizationName		= Organization Name (eg, company)0.organizationName_default	= OpenCAcountryName			= Country Name (2 letter code)countryName_default		= ITcountryName_min			= 2countryName_max			= 2## stateOrProvinceName		= State or Province Name (full name)## stateOrProvinceName_default	= Some-State## localityName			= Locality Name (eg, city)# we can do this but it is not needed normally :-)#1.organizationName		= Second Organization Name (eg, company)#1.organizationName_default	= World Wide Web Pty LtdSET-ex3				= SET extension number 3[ req_attributes ]## challengePassword		= A challenge password## challengePassword_min	= 4## challengePassword_max	= 20## unstructuredName		= An optional company name#################################################################[ user_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# For an object signing certificate this would be used.#nsCertType = objsign# For normal client use this is typicalnsCertType = client, email# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment		= "OpenCA User Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName#################################################################[ v3_ca]# Extensions for a typical CA# It's a CA certificatebasicConstraints = critical, CA:true# PKIX recommendation.subjectKeyIdentifier=hash# authorityKeyIdentifier=keyid:always,issuer:alwaysauthorityKeyIdentifier=keyid:always# This is what PKIX recommends but some broken software chokes on critical# extensions.#basicConstraints = critical,CA:true# Key usage: again this should really be critical.keyUsage = critical, digitalSignature, nonRepudiation, cRLSign, keyCertSign# Some might want this alsonsCertType = sslCA, emailCA, objCA# Include email address in subject alt name: another PKIX recommendationsubjectAltName=URI:http://www.openca.org/# Copy issuer detailsissuerAltName=issuer:copy# AdditionalauthorityInfoAccess=OCSP;URI:http://www.openca.org/ocspauthorityInfoAccess=caIssuers;URI:http://www.openca.org/ca/ca.htmlcrlDistributionPoints=URI:http://www.openca.org/cgi-bin/getcrl# RAW DER hex encoding of an extension: beware experts only!# 1.2.3.5=RAW:02:03# You can even override a supported extension:# basicConstraints= critical, RAW:30:03:01:01:FF#################################################################[ server_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.nsCertType			= server# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment			= "OpenCA Server Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName		= $ENV::SERVER_NAME#################################################################[ user_objsign_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.#nsCertType			= server# For an object signing certificate this would be used.nsCertType = objsign# For normal client use this is typicalnsCertType = client, email, objsign# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment			= "OpenCA User ObjSign Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName#################################################################[ server_objsign_cert ]# These extensions are added when 'ca' signs a request.# This goes against PKIX guidelines but some CAs do it and some software# requires this to avoid interpreting an end user certificate as a CA.basicConstraints=CA:FALSE# Here are some examples of the usage of nsCertType. If it is omitted# the certificate can be used for anything *except* object signing.# This is OK for an SSL server.nsCertType			= server, objsign# This is typical alsokeyUsage = nonRepudiation, digitalSignature, keyEnciphermentnsComment			= "OpenCA Server ObjSign Certificate"# PKIX recommendationssubjectKeyIdentifier=hashauthorityKeyIdentifier=keyid,issuer:always# Import the email address.subjectAltName=email:copy# Copy subject detailsissuerAltName=issuer:copynsCaRevocationUrl	= https://www.openca.org/cgi-bin/getcrl#nsBaseUrlnsRevocationUrl		= https://www.openca.org/cgi-bin/getcrlnsRenewalUrl		= https://www.openca.org:4443/renewal#nsCaPolicyUrl#nsSslServerName		= $ENV::SERVER_NAME#################################################################[ crl_ext ]# CRL extensions.# Only issuerAltName and authorityKeyIdentifier make any sense in a CRL.# As Netscape only accepts CLRs Version1, DON't use CRL's extensions# at least if you are uning Netscape 4.5(-).# issuerAltName=issuer:copy# authorityKeyIdentifier=keyid:always,issuer:always

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -